FREE TO VIEW


« Back to News

2016-09-27

Cybercrime Inc. Hackers Model Themselves On Big Business

Cybercrime is an industry involving major criminal groups, with ecosystems as well-structured as the corporations they are attempting to target.

2016-09-27

Finding The Right Security Professional

Demand for talented cybersecurity professionals far outweighs supply.

2016-09-26

Delete/Never-Use Google Allo: Says Snowden

Edward Snowden has warned people not to use Google’s new chat app, because it lets the company read everything that they say.

2016-09-26

Company Lost $44m Through One Email Fraud

A simple email fraud tricked one company's Finance Dept. into transferring 40m Euros to a fake foreign bank account.

2016-09-26

Managing Cyber Risk

Effective cybersecurity depends on humans and artificial machine intelligence working together to protect businesses, institutions and communities.

2016-09-26

Staff Training 'Not enough to stop most data breaches'

Companies leave themselves wide open to cyber-attacks due to staff negligence. Training alone is not sufficient to change risky employee behaviour.

2016-09-23

Why Spear-Phishing Hacks Are So Successful

Exploiting poor security. Tracking with spyware. Creating fake employees. It's all about information gathering.

2016-09-23

New Cyber Tricks Make ISIS Sophisticated

Terror attacks in Europe have killed more than 200 people in the past 20 months, showing IS has a new operational discipline & technical acumen.

2016-09-23

Terror Threat In 2016 Worse Than 2001

Fifteen years after the 9/11 attack, the battle against terrorism is far from over. The threat today is worse than the one confronted in 2001.

2016-09-22

Are Cyber Breaches The New Norm?

Normal: The first half of 2016 saw 538 known breaches; 60 percent of businesses losing valuable IP and approximately 13m records exposed.

2016-09-21

Social Media Sites - Cyber Weapons of Choice

Facebook, LinkedIn and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security know-how.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Security Current

Security Current

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

CyFIR

CyFIR

CyFIR is a network investigation and Incident Response tool for performing live computer investigations across any size enterprise.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

Carson McDowell

Carson McDowell

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

PrimeSSL

PrimeSSL

PrimeSSL, a leading Certificate Authority (CA) backed by the trusted Sectigo Root, delivers affordable and user-friendly SSL/TLS certificate solutions.